Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
1. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
Volume 3, Issue 4 , Summer and Autumn 2016, Pages 201-209
Abstract
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the ... Read More2. Multicollision Attack on a recently proposed hash function vMDC-2
Volume 3, Issue 4 , Summer and Autumn 2016, Pages 211-215
Abstract
In this paper, we describe an attack on a new double block length hash function which was proposed as a variant of MDC-2 and MDC-4. The vMDC-2 compression function is based on two calls ... Read More3. Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks
Volume 3, Issue 4 , Summer and Autumn 2016, Pages 217-231
Abstract
Named Data Networking (NDN), a data-centric enabled-cache architecture, as one of the candidates for the future Internet, has the potential to overcome many of the current Internet ... Read More4. Persian Texts Part of Speech Tagging Using Artificial Neural Networks
Volume 3, Issue 4 , Summer and Autumn 2016, Pages 233-241